Generational Dynamics |
|
Forecasting America's Destiny ... and the World's | |
HOME WEB LOG COUNTRY WIKI COMMENT FORUM DOWNLOADS ABOUT | |
Threat of widespread terror network grows as U.S. leaves Afghanistan
This morning's key headlines from GenerationalDynamics.com
Egypt's Sinai Peninsula region, where the borders of Gaza, Israel and Egypt all converge, is becoming an increasing threat to Egypt, because of Bedouin unrest and jihadist terrorism. Tensions have been high in the Sinai since six Egyptian policemen and a soldier were kidnapped ten days ago by a Bedouin tribe allied with al-Qaeda linked terrorists. The hostages were finally released on Wednesday, but there's no guarantee that there won't be more kidnappings, and Morsi has announced that there will be a new military operation in the Sinai to arrest the kidnappers.
When the Muslim Brotherhood's candidate Mohamed Morsi beause president of Egypt in July of last year, the leaders of Hamas rejoiced. When Hamas was formed over 30 years ago, it was actually an offshoot of the Muslim Brotherhood. And now, with a Brotherhood candidate in power in Egypt, Hamas foresaw a new era of freedom and joy for the residents of Gaza, after years of alleged oppression by the Israelis. Well, like so many other hopes and dreams in people's lives, this one didn't turn out the way they had hoped. Morsi's relations with Hamas officials have been quite frosty and, in particular, Morsi suggested that Hamas or other Gaza militants might have been responsible for the jihadist murder, in August of last year, of 16 policemen and soldiers in Egypt's Sinai, where the borders of Gaza, Israel and Egypt all converge. Morsi sternly warned Hamas, "May God help you if we find your fingerprints on what happened in the Sinai." Those suspicions were renewed by last week's Sinai kidnappings, and Hamas scrambled to assure the Egyptians that it had nothing to do with them.
Remarkably, the terrorists in Sinai are accomplishing something that any "peace process" had failed to do: Bring about cooperation among Israel, Hamas and Egypt in fighting a common enemy. Al-Monitor and Jerusalem Post
The jihadist network in Kazakhstan, inspired and financed by al-Qaeda, the Taliban and the Caucasus Emirate, has shifted from a loose grouping of largely autonomous militias into a unified movement that threatens not only Kazakhstan but all of Central Asia. Islamist groups in Kazakhstan are seeking to form an independent jihadist network like the one that exists in Russia's North Caucasus and then to pursue the establishment of a sharia state. That the goals of the Kazakhstani and North Caucasian groups are so similar reflects the influence of North Caucasus terrorist Said Buryatsky, who visited Kazakhstan between 2004 and 2006. Buryatsky's ideas are featured on many radical Islamist websites even now, and are often reflected in the thinking of Salafi groups in Central Asia.
According to an analysis by Russia's military intelligence agency, the GRU, the withdrawal of Western forces from Afghanistan in 2014 poses a "serious challenge to international stability" and increase the threat of terrorism and religious extremism:
"A diversified terrorist network, including suicide bomber training camps has already been established in the country and the Taliban has close links with foreign terrorist structures whose militants, having gained combat experience in Afghanistan, could be sent to other hot spots across the world."
Combined with the rise of militias in Central Asia, as well as the disintegration of Syria, al-Qaeda linked groups could use force to establish "a global caliphate" from Morocco to Malaysia. Jamestown and Ria Novosti
(Comments: For reader comments, questions and discussion, see the 25-May-13 World View -- Egypt, Hamas, Israel cooperate as Sinai becomes more volatile thread of the Generational Dynamics forum. Comments may be
posted anonymously.)
(25-May-2013)
Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004